A recent social media post by quantum computing researcher Gurinder Singh (Guri) highlights a startling acceleration in the perceived quantum threat to modern encryption. The timeline shows a dramatic collapse in expert estimates for the number of qubits required to break RSA-2048, the foundational algorithm for much of today's internet security.
What Happened
In a post on X (formerly Twitter), Singh charted the rapidly shrinking estimates:
- 2012: 1 billion qubits needed
- 2021: 20 million qubits needed
- February 2026: 100,000 qubits needed
- Last week (April 2026): 10,000 qubits needed
This represents a 100,000-fold reduction in just four years, with the most recent estimate suggesting viable attacks could emerge with quantum computers two orders of magnitude smaller than previously thought.
Context: The RSA-2048 Challenge
RSA-2048 encryption relies on the mathematical difficulty of factoring large prime numbers—a task that would take classical computers billions of years. However, Shor's algorithm, when run on a sufficiently powerful fault-tolerant quantum computer, could theoretically break RSA-2048 in hours or days.
The key constraint has always been the number of logical qubits (error-corrected, stable qubits) required to implement Shor's algorithm at scale. Recent algorithmic improvements, better error correction schemes, and more efficient circuit designs have dramatically reduced these requirements.
The Implication: Timeline Compression
The most concerning aspect isn't the absolute number (10,000 logical qubits) but the rate of revision. When estimates drop by a factor of 10 within two months (from 100,000 in February to 10,000 in April), it suggests researchers are discovering fundamental optimizations that were previously overlooked.
Current state-of-the-art quantum computers operate with hundreds of physical qubits, but these are noisy and prone to errors. Building 10,000 logical qubits would require millions of physical qubits with current error correction overheads—still a formidable engineering challenge but now appearing on a more visible horizon.
The Post-Quantum Cryptography Race
This acceleration directly impacts the global migration to post-quantum cryptography (PQC). NIST selected the first PQC standards (CRYSTALS-Kyber for encryption, CRYSTALS-Dilithium for signatures) in 2022, anticipating a 10-20 year migration window. The new estimates suggest that window may be closing faster than expected.
Major technology companies have already begun PQC integration:
- Google started testing PQC in Chrome in 2023
- Cloudflare deployed hybrid PQC/RSA solutions in 2024
- AWS announced quantum-safe key management services in 2025
However, critical infrastructure—banking systems, government communications, industrial controls—remains largely vulnerable, with migration timelines often extending into the 2030s.
gentic.news Analysis
This acceleration in threat assessment aligns with several trends we've been tracking. First, it reflects the algorithmic efficiency gains in quantum computing that often precede hardware breakthroughs. As we covered in our February 2026 analysis of Google's "Cirq 3.0" release, quantum circuit optimization tools have improved dramatically, reducing gate counts by 40-60% for common algorithms like Shor's.
Second, this connects directly to the NIST PQC migration timeline compression we reported on last month. The original NIST migration schedule assumed RSA-2048 would remain secure until at least 2035, but multiple research teams (including Microsoft's QuArC group and IBM's Quantum Security team) have privately revised their internal estimates to 2030-2032.
Third, this creates immediate pressure on quantum key distribution (QKD) and quantum random number generation (QRNG) markets. As traditional public-key cryptography appears more vulnerable, quantum-based security solutions gain urgency. Companies like ID Quantique and QuintessenceLabs have seen increased enterprise interest, though practical deployment challenges remain significant.
The most concerning implication is for long-lived secrets. Data encrypted today with RSA-2048 that needs to remain secure for 20-30 years (diplomatic cables, pharmaceutical research, genomic data) may already be at risk from "store now, decrypt later" attacks, where adversaries collect encrypted data today to decrypt when quantum computers become available.
Frequently Asked Questions
How soon could a quantum computer break RSA-2048?
Based on the 10,000 logical qubit estimate and current quantum hardware roadmaps, most experts now predict viable attacks could emerge between 2030-2035, though breakthrough error correction or algorithmic improvements could accelerate this further. The consensus has shifted from "maybe in our lifetime" to "likely within a decade."
What should organizations do immediately?
Security teams should: 1) Complete cryptographic inventories to identify all RSA-2048 dependencies, 2) Begin testing NIST-approved PQC algorithms in non-critical systems, 3) Implement hybrid solutions (PQC + traditional) for new deployments, and 4) Develop migration plans for legacy systems with 3-5 year completion targets rather than 10-15 year timelines.
Are other encryption algorithms equally vulnerable?
Symmetric encryption (AES-256) and hash functions (SHA-384) are considered quantum-resistant with sufficiently large key sizes. Elliptic curve cryptography (ECC) is actually more vulnerable than RSA to quantum attacks—Grover's algorithm can break 256-bit ECC with only ~2,000 logical qubits. The migration urgency applies to all public-key cryptography, not just RSA.
What's the difference between physical and logical qubits?
Physical qubits are the actual quantum hardware components, which are noisy and error-prone. Logical qubits are error-corrected qubits built from many physical qubits—typically 100-1,000 physical qubits per logical qubit with current error correction schemes. The 10,000 estimate refers to logical qubits, meaning millions of physical qubits would be required.









